Completed
Pull Request — master (#7418)
by Blizzz
28:19 queued 13:51
created
lib/public/SystemTag/ISystemTagManagerFactory.php 1 patch
Indentation   +22 added lines, -22 removed lines patch added patch discarded remove patch
@@ -33,28 +33,28 @@
 block discarded – undo
33 33
  */
34 34
 interface ISystemTagManagerFactory {
35 35
 
36
-	/**
37
-	 * Constructor for the system tag manager factory
38
-	 *
39
-	 * @param IServerContainer $serverContainer server container
40
-	 * @since 9.0.0
41
-	 */
42
-	public function __construct(IServerContainer $serverContainer);
36
+    /**
37
+     * Constructor for the system tag manager factory
38
+     *
39
+     * @param IServerContainer $serverContainer server container
40
+     * @since 9.0.0
41
+     */
42
+    public function __construct(IServerContainer $serverContainer);
43 43
 
44
-	/**
45
-	 * creates and returns an instance of the system tag manager
46
-	 *
47
-	 * @return ISystemTagManager
48
-	 * @since 9.0.0
49
-	 */
50
-	public function getManager();
44
+    /**
45
+     * creates and returns an instance of the system tag manager
46
+     *
47
+     * @return ISystemTagManager
48
+     * @since 9.0.0
49
+     */
50
+    public function getManager();
51 51
 
52
-	/**
53
-	 * creates and returns an instance of the system tag object
54
-	 * mapper
55
-	 *
56
-	 * @return ISystemTagObjectMapper
57
-	 * @since 9.0.0
58
-	 */
59
-	public function getObjectMapper();
52
+    /**
53
+     * creates and returns an instance of the system tag object
54
+     * mapper
55
+     *
56
+     * @return ISystemTagObjectMapper
57
+     * @since 9.0.0
58
+     */
59
+    public function getObjectMapper();
60 60
 }
Please login to merge, or discard this patch.
lib/public/SystemTag/ISystemTagObjectMapper.php 1 patch
Indentation   +93 added lines, -93 removed lines patch added patch discarded remove patch
@@ -30,102 +30,102 @@
 block discarded – undo
30 30
  */
31 31
 interface ISystemTagObjectMapper {
32 32
 
33
-	/**
34
-	 * Get a list of tag ids for the given object ids.
35
-	 *
36
-	 * This returns an array that maps object id to tag ids
37
-	 * [
38
-	 *   1 => array('id1', 'id2'),
39
-	 *   2 => array('id3', 'id2'),
40
-	 *   3 => array('id5'),
41
-	 *   4 => array()
42
-	 * ]
43
-	 *
44
-	 * Untagged objects will have an empty array associated.
45
-	 *
46
-	 * @param string|array $objIds object ids
47
-	 * @param string $objectType object type
48
-	 *
49
-	 * @return array with object id as key and an array
50
-	 * of tag ids as value
51
-	 *
52
-	 * @since 9.0.0
53
-	 */
54
-	public function getTagIdsForObjects($objIds, $objectType);
33
+    /**
34
+     * Get a list of tag ids for the given object ids.
35
+     *
36
+     * This returns an array that maps object id to tag ids
37
+     * [
38
+     *   1 => array('id1', 'id2'),
39
+     *   2 => array('id3', 'id2'),
40
+     *   3 => array('id5'),
41
+     *   4 => array()
42
+     * ]
43
+     *
44
+     * Untagged objects will have an empty array associated.
45
+     *
46
+     * @param string|array $objIds object ids
47
+     * @param string $objectType object type
48
+     *
49
+     * @return array with object id as key and an array
50
+     * of tag ids as value
51
+     *
52
+     * @since 9.0.0
53
+     */
54
+    public function getTagIdsForObjects($objIds, $objectType);
55 55
 
56
-	/**
57
-	 * Get a list of objects tagged with $tagIds.
58
-	 *
59
-	 * @param string|array $tagIds Tag id or array of tag ids.
60
-	 * @param string $objectType object type
61
-	 * @param int $limit Count of object ids you want to get
62
-	 * @param string $offset The last object id you already received
63
-	 *
64
-	 * @return string[] array of object ids or empty array if none found
65
-	 *
66
-	 * @throws \OCP\SystemTag\TagNotFoundException if at least one of the
67
-	 * given tags does not exist
68
-	 * @throws \InvalidArgumentException When a limit is specified together with
69
-	 * multiple tag ids
70
-	 *
71
-	 * @since 9.0.0
72
-	 */
73
-	public function getObjectIdsForTags($tagIds, $objectType, $limit = 0, $offset = '');
56
+    /**
57
+     * Get a list of objects tagged with $tagIds.
58
+     *
59
+     * @param string|array $tagIds Tag id or array of tag ids.
60
+     * @param string $objectType object type
61
+     * @param int $limit Count of object ids you want to get
62
+     * @param string $offset The last object id you already received
63
+     *
64
+     * @return string[] array of object ids or empty array if none found
65
+     *
66
+     * @throws \OCP\SystemTag\TagNotFoundException if at least one of the
67
+     * given tags does not exist
68
+     * @throws \InvalidArgumentException When a limit is specified together with
69
+     * multiple tag ids
70
+     *
71
+     * @since 9.0.0
72
+     */
73
+    public function getObjectIdsForTags($tagIds, $objectType, $limit = 0, $offset = '');
74 74
 
75
-	/**
76
-	 * Assign the given tags to the given object.
77
-	 *
78
-	 * If at least one of the given tag ids doesn't exist, none of the tags
79
-	 * will be assigned.
80
-	 *
81
-	 * If the relationship already existed, fail silently.
82
-	 *
83
-	 * @param string $objId object id
84
-	 * @param string $objectType object type
85
-	 * @param string|array $tagIds tag id or array of tag ids to assign
86
-	 *
87
-	 * @throws \OCP\SystemTag\TagNotFoundException if at least one of the
88
-	 * given tags does not exist
89
-	 *
90
-	 * @since 9.0.0
91
-	 */
92
-	public function assignTags($objId, $objectType, $tagIds);
75
+    /**
76
+     * Assign the given tags to the given object.
77
+     *
78
+     * If at least one of the given tag ids doesn't exist, none of the tags
79
+     * will be assigned.
80
+     *
81
+     * If the relationship already existed, fail silently.
82
+     *
83
+     * @param string $objId object id
84
+     * @param string $objectType object type
85
+     * @param string|array $tagIds tag id or array of tag ids to assign
86
+     *
87
+     * @throws \OCP\SystemTag\TagNotFoundException if at least one of the
88
+     * given tags does not exist
89
+     *
90
+     * @since 9.0.0
91
+     */
92
+    public function assignTags($objId, $objectType, $tagIds);
93 93
 
94
-	/**
95
-	 * Unassign the given tags from the given object.
96
-	 *
97
-	 * If at least one of the given tag ids doesn't exist, none of the tags
98
-	 * will be unassigned.
99
-	 *
100
-	 * If the relationship did not exist in the first place, fail silently.
101
-	 *
102
-	 * @param string $objId object id
103
-	 * @param string $objectType object type
104
-	 * @param string|array $tagIds tag id or array of tag ids to unassign
105
-	 *
106
-	 * @throws \OCP\SystemTag\TagNotFoundException if at least one of the
107
-	 * given tags does not exist
108
-	 *
109
-	 * @since 9.0.0
110
-	 */
111
-	public function unassignTags($objId, $objectType, $tagIds);
94
+    /**
95
+     * Unassign the given tags from the given object.
96
+     *
97
+     * If at least one of the given tag ids doesn't exist, none of the tags
98
+     * will be unassigned.
99
+     *
100
+     * If the relationship did not exist in the first place, fail silently.
101
+     *
102
+     * @param string $objId object id
103
+     * @param string $objectType object type
104
+     * @param string|array $tagIds tag id or array of tag ids to unassign
105
+     *
106
+     * @throws \OCP\SystemTag\TagNotFoundException if at least one of the
107
+     * given tags does not exist
108
+     *
109
+     * @since 9.0.0
110
+     */
111
+    public function unassignTags($objId, $objectType, $tagIds);
112 112
 
113
-	/**
114
-	 * Checks whether the given objects have the given tag.
115
-	 *
116
-	 * @param string|array $objIds object ids
117
-	 * @param string $objectType object type
118
-	 * @param string $tagId tag id to check
119
-	 * @param bool $all true to check that ALL objects have the tag assigned,
120
-	 * false to check that at least ONE object has the tag.
121
-	 *
122
-	 * @return bool true if the condition set by $all is matched, false
123
-	 * otherwise
124
-	 *
125
-	 * @throws \OCP\SystemTag\TagNotFoundException if the tag does not exist
126
-	 *
127
-	 * @since 9.0.0
128
-	 */
129
-	public function haveTag($objIds, $objectType, $tagId, $all = true);
113
+    /**
114
+     * Checks whether the given objects have the given tag.
115
+     *
116
+     * @param string|array $objIds object ids
117
+     * @param string $objectType object type
118
+     * @param string $tagId tag id to check
119
+     * @param bool $all true to check that ALL objects have the tag assigned,
120
+     * false to check that at least ONE object has the tag.
121
+     *
122
+     * @return bool true if the condition set by $all is matched, false
123
+     * otherwise
124
+     *
125
+     * @throws \OCP\SystemTag\TagNotFoundException if the tag does not exist
126
+     *
127
+     * @since 9.0.0
128
+     */
129
+    public function haveTag($objIds, $objectType, $tagId, $all = true);
130 130
 
131 131
 }
Please login to merge, or discard this patch.
lib/public/SystemTag/SystemTagsEntityEvent.php 2 patches
Indentation   +37 added lines, -37 removed lines patch added patch discarded remove patch
@@ -32,46 +32,46 @@
 block discarded – undo
32 32
  */
33 33
 class SystemTagsEntityEvent extends Event {
34 34
 
35
-	const EVENT_ENTITY = 'OCP\SystemTag\ISystemTagManager::registerEntity';
35
+    const EVENT_ENTITY = 'OCP\SystemTag\ISystemTagManager::registerEntity';
36 36
 
37
-	/** @var string */
38
-	protected $event;
39
-	/** @var \Closure[] */
40
-	protected $collections;
37
+    /** @var string */
38
+    protected $event;
39
+    /** @var \Closure[] */
40
+    protected $collections;
41 41
 
42
-	/**
43
-	 * SystemTagsEntityEvent constructor.
44
-	 *
45
-	 * @param string $event
46
-	 * @since 9.1.0
47
-	 */
48
-	public function __construct($event) {
49
-		$this->event = $event;
50
-		$this->collections = [];
51
-	}
42
+    /**
43
+     * SystemTagsEntityEvent constructor.
44
+     *
45
+     * @param string $event
46
+     * @since 9.1.0
47
+     */
48
+    public function __construct($event) {
49
+        $this->event = $event;
50
+        $this->collections = [];
51
+    }
52 52
 
53
-	/**
54
-	 * @param string $name
55
-	 * @param \Closure $entityExistsFunction The closure should take one
56
-	 *                 argument, which is the id of the entity, that tags
57
-	 *                 should be handled for. The return should then be bool,
58
-	 *                 depending on whether tags are allowed (true) or not.
59
-	 * @throws \OutOfBoundsException when the entity name is already taken
60
-	 * @since 9.1.0
61
-	 */
62
-	public function addEntityCollection($name, \Closure $entityExistsFunction) {
63
-		if (isset($this->collections[$name])) {
64
-			throw new \OutOfBoundsException('Duplicate entity name "' . $name . '"');
65
-		}
53
+    /**
54
+     * @param string $name
55
+     * @param \Closure $entityExistsFunction The closure should take one
56
+     *                 argument, which is the id of the entity, that tags
57
+     *                 should be handled for. The return should then be bool,
58
+     *                 depending on whether tags are allowed (true) or not.
59
+     * @throws \OutOfBoundsException when the entity name is already taken
60
+     * @since 9.1.0
61
+     */
62
+    public function addEntityCollection($name, \Closure $entityExistsFunction) {
63
+        if (isset($this->collections[$name])) {
64
+            throw new \OutOfBoundsException('Duplicate entity name "' . $name . '"');
65
+        }
66 66
 
67
-		$this->collections[$name] = $entityExistsFunction;
68
-	}
67
+        $this->collections[$name] = $entityExistsFunction;
68
+    }
69 69
 
70
-	/**
71
-	 * @return \Closure[]
72
-	 * @since 9.1.0
73
-	 */
74
-	public function getEntityCollections() {
75
-		return $this->collections;
76
-	}
70
+    /**
71
+     * @return \Closure[]
72
+     * @since 9.1.0
73
+     */
74
+    public function getEntityCollections() {
75
+        return $this->collections;
76
+    }
77 77
 }
Please login to merge, or discard this patch.
Spacing   +1 added lines, -1 removed lines patch added patch discarded remove patch
@@ -61,7 +61,7 @@
 block discarded – undo
61 61
 	 */
62 62
 	public function addEntityCollection($name, \Closure $entityExistsFunction) {
63 63
 		if (isset($this->collections[$name])) {
64
-			throw new \OutOfBoundsException('Duplicate entity name "' . $name . '"');
64
+			throw new \OutOfBoundsException('Duplicate entity name "'.$name.'"');
65 65
 		}
66 66
 
67 67
 		$this->collections[$name] = $entityExistsFunction;
Please login to merge, or discard this patch.
lib/private/Authentication/LoginCredentials/Credentials.php 1 patch
Indentation   +34 added lines, -34 removed lines patch added patch discarded remove patch
@@ -28,45 +28,45 @@
 block discarded – undo
28 28
 
29 29
 class Credentials implements ICredentials {
30 30
 
31
-	/** @var string */
32
-	private $uid;
31
+    /** @var string */
32
+    private $uid;
33 33
 
34
-	/** @var string */
35
-	private $loginName;
34
+    /** @var string */
35
+    private $loginName;
36 36
 
37
-	/** @var string */
38
-	private $password;
37
+    /** @var string */
38
+    private $password;
39 39
 
40
-	/**
41
-	 * @param string $uid
42
-	 * @param string $loginName
43
-	 * @param string $password
44
-	 */
45
-	public function __construct($uid, $loginName, $password) {
46
-		$this->uid = $uid;
47
-		$this->loginName = $loginName;
48
-		$this->password = $password;
49
-	}
40
+    /**
41
+     * @param string $uid
42
+     * @param string $loginName
43
+     * @param string $password
44
+     */
45
+    public function __construct($uid, $loginName, $password) {
46
+        $this->uid = $uid;
47
+        $this->loginName = $loginName;
48
+        $this->password = $password;
49
+    }
50 50
 
51
-	/**
52
-	 * @return string
53
-	 */
54
-	public function getUID() {
55
-		return $this->uid;
56
-	}
51
+    /**
52
+     * @return string
53
+     */
54
+    public function getUID() {
55
+        return $this->uid;
56
+    }
57 57
 
58
-	/**
59
-	 * @return string
60
-	 */
61
-	public function getLoginName() {
62
-		return $this->loginName;
63
-	}
58
+    /**
59
+     * @return string
60
+     */
61
+    public function getLoginName() {
62
+        return $this->loginName;
63
+    }
64 64
 
65
-	/**
66
-	 * @return string
67
-	 */
68
-	public function getPassword() {
69
-		return $this->password;
70
-	}
65
+    /**
66
+     * @return string
67
+     */
68
+    public function getPassword() {
69
+        return $this->password;
70
+    }
71 71
 
72 72
 }
Please login to merge, or discard this patch.
lib/private/Authentication/LoginCredentials/Store.php 1 patch
Indentation   +79 added lines, -79 removed lines patch added patch discarded remove patch
@@ -37,84 +37,84 @@
 block discarded – undo
37 37
 
38 38
 class Store implements IStore {
39 39
 
40
-	/** @var ISession */
41
-	private $session;
42
-
43
-	/** @var ILogger */
44
-	private $logger;
45
-
46
-	/** @var IProvider|null */
47
-	private $tokenProvider;
48
-
49
-	/**
50
-	 * @param ISession $session
51
-	 * @param ILogger $logger
52
-	 * @param IProvider $tokenProvider
53
-	 */
54
-	public function __construct(ISession $session, ILogger $logger, IProvider $tokenProvider = null) {
55
-		$this->session = $session;
56
-		$this->logger = $logger;
57
-		$this->tokenProvider = $tokenProvider;
58
-
59
-		Util::connectHook('OC_User', 'post_login', $this, 'authenticate');
60
-	}
61
-
62
-	/**
63
-	 * Hook listener on post login
64
-	 *
65
-	 * @param array $params
66
-	 */
67
-	public function authenticate(array $params) {
68
-		$this->session->set('login_credentials', json_encode($params));
69
-	}
70
-
71
-	/**
72
-	 * Replace the session implementation
73
-	 *
74
-	 * @param ISession $session
75
-	 */
76
-	public function setSession(ISession $session) {
77
-		$this->session = $session;
78
-	}
79
-
80
-	/**
81
-	 * @since 12
82
-	 *
83
-	 * @return ICredentials the login credentials of the current user
84
-	 * @throws CredentialsUnavailableException
85
-	 */
86
-	public function getLoginCredentials() {
87
-		if (is_null($this->tokenProvider)) {
88
-			throw new CredentialsUnavailableException();
89
-		}
90
-
91
-		$trySession = false;
92
-		try {
93
-			$sessionId = $this->session->getId();
94
-			$token = $this->tokenProvider->getToken($sessionId);
95
-
96
-			$uid = $token->getUID();
97
-			$user = $token->getLoginName();
98
-			$password = $this->tokenProvider->getPassword($token, $sessionId);
99
-
100
-			return new Credentials($uid, $user, $password);
101
-		} catch (SessionNotAvailableException $ex) {
102
-			$this->logger->debug('could not get login credentials because session is unavailable', ['app' => 'core']);
103
-		} catch (InvalidTokenException $ex) {
104
-			$this->logger->debug('could not get login credentials because the token is invalid', ['app' => 'core']);
105
-			$trySession = true;
106
-		} catch (PasswordlessTokenException $ex) {
107
-			$this->logger->debug('could not get login credentials because the token has no password', ['app' => 'core']);
108
-			$trySession = true;
109
-		}
110
-
111
-		if ($trySession && $this->session->exists('login_credentials')) {
112
-			$creds = json_decode($this->session->get('login_credentials'));
113
-			return new Credentials($creds->uid, $creds->uid, $creds->password);
114
-		}
115
-
116
-		// If we reach this line, an exception was thrown.
117
-		throw new CredentialsUnavailableException();
118
-	}
40
+    /** @var ISession */
41
+    private $session;
42
+
43
+    /** @var ILogger */
44
+    private $logger;
45
+
46
+    /** @var IProvider|null */
47
+    private $tokenProvider;
48
+
49
+    /**
50
+     * @param ISession $session
51
+     * @param ILogger $logger
52
+     * @param IProvider $tokenProvider
53
+     */
54
+    public function __construct(ISession $session, ILogger $logger, IProvider $tokenProvider = null) {
55
+        $this->session = $session;
56
+        $this->logger = $logger;
57
+        $this->tokenProvider = $tokenProvider;
58
+
59
+        Util::connectHook('OC_User', 'post_login', $this, 'authenticate');
60
+    }
61
+
62
+    /**
63
+     * Hook listener on post login
64
+     *
65
+     * @param array $params
66
+     */
67
+    public function authenticate(array $params) {
68
+        $this->session->set('login_credentials', json_encode($params));
69
+    }
70
+
71
+    /**
72
+     * Replace the session implementation
73
+     *
74
+     * @param ISession $session
75
+     */
76
+    public function setSession(ISession $session) {
77
+        $this->session = $session;
78
+    }
79
+
80
+    /**
81
+     * @since 12
82
+     *
83
+     * @return ICredentials the login credentials of the current user
84
+     * @throws CredentialsUnavailableException
85
+     */
86
+    public function getLoginCredentials() {
87
+        if (is_null($this->tokenProvider)) {
88
+            throw new CredentialsUnavailableException();
89
+        }
90
+
91
+        $trySession = false;
92
+        try {
93
+            $sessionId = $this->session->getId();
94
+            $token = $this->tokenProvider->getToken($sessionId);
95
+
96
+            $uid = $token->getUID();
97
+            $user = $token->getLoginName();
98
+            $password = $this->tokenProvider->getPassword($token, $sessionId);
99
+
100
+            return new Credentials($uid, $user, $password);
101
+        } catch (SessionNotAvailableException $ex) {
102
+            $this->logger->debug('could not get login credentials because session is unavailable', ['app' => 'core']);
103
+        } catch (InvalidTokenException $ex) {
104
+            $this->logger->debug('could not get login credentials because the token is invalid', ['app' => 'core']);
105
+            $trySession = true;
106
+        } catch (PasswordlessTokenException $ex) {
107
+            $this->logger->debug('could not get login credentials because the token has no password', ['app' => 'core']);
108
+            $trySession = true;
109
+        }
110
+
111
+        if ($trySession && $this->session->exists('login_credentials')) {
112
+            $creds = json_decode($this->session->get('login_credentials'));
113
+            return new Credentials($creds->uid, $creds->uid, $creds->password);
114
+        }
115
+
116
+        // If we reach this line, an exception was thrown.
117
+        throw new CredentialsUnavailableException();
118
+    }
119 119
 
120 120
 }
Please login to merge, or discard this patch.
lib/private/Authentication/TwoFactorAuth/Manager.php 2 patches
Spacing   +1 added lines, -1 removed lines patch added patch discarded remove patch
@@ -159,7 +159,7 @@
 block discarded – undo
159 159
 			}
160 160
 		}
161 161
 
162
-		return array_filter($providers, function ($provider) use ($user) {
162
+		return array_filter($providers, function($provider) use ($user) {
163 163
 			/* @var $provider IProvider */
164 164
 			return $provider->isTwoFactorAuthEnabledForUser($user);
165 165
 		});
Please login to merge, or discard this patch.
Indentation   +288 added lines, -288 removed lines patch added patch discarded remove patch
@@ -41,296 +41,296 @@
 block discarded – undo
41 41
 
42 42
 class Manager {
43 43
 
44
-	const SESSION_UID_KEY = 'two_factor_auth_uid';
45
-	const SESSION_UID_DONE = 'two_factor_auth_passed';
46
-	const BACKUP_CODES_APP_ID = 'twofactor_backupcodes';
47
-	const BACKUP_CODES_PROVIDER_ID = 'backup_codes';
48
-	const REMEMBER_LOGIN = 'two_factor_remember_login';
49
-
50
-	/** @var AppManager */
51
-	private $appManager;
52
-
53
-	/** @var ISession */
54
-	private $session;
55
-
56
-	/** @var IConfig */
57
-	private $config;
58
-
59
-	/** @var IManager */
60
-	private $activityManager;
61
-
62
-	/** @var ILogger */
63
-	private $logger;
64
-
65
-	/** @var TokenProvider */
66
-	private $tokenProvider;
67
-
68
-	/** @var ITimeFactory */
69
-	private $timeFactory;
70
-
71
-	/**
72
-	 * @param AppManager $appManager
73
-	 * @param ISession $session
74
-	 * @param IConfig $config
75
-	 * @param IManager $activityManager
76
-	 * @param ILogger $logger
77
-	 * @param TokenProvider $tokenProvider
78
-	 * @param ITimeFactory $timeFactory
79
-	 */
80
-	public function __construct(AppManager $appManager,
81
-								ISession $session,
82
-								IConfig $config,
83
-								IManager $activityManager,
84
-								ILogger $logger,
85
-								TokenProvider $tokenProvider,
86
-								ITimeFactory $timeFactory) {
87
-		$this->appManager = $appManager;
88
-		$this->session = $session;
89
-		$this->config = $config;
90
-		$this->activityManager = $activityManager;
91
-		$this->logger = $logger;
92
-		$this->tokenProvider = $tokenProvider;
93
-		$this->timeFactory = $timeFactory;
94
-	}
95
-
96
-	/**
97
-	 * Determine whether the user must provide a second factor challenge
98
-	 *
99
-	 * @param IUser $user
100
-	 * @return boolean
101
-	 */
102
-	public function isTwoFactorAuthenticated(IUser $user) {
103
-		$twoFactorEnabled = ((int) $this->config->getUserValue($user->getUID(), 'core', 'two_factor_auth_disabled', 0)) === 0;
104
-		return $twoFactorEnabled && count($this->getProviders($user)) > 0;
105
-	}
106
-
107
-	/**
108
-	 * Disable 2FA checks for the given user
109
-	 *
110
-	 * @param IUser $user
111
-	 */
112
-	public function disableTwoFactorAuthentication(IUser $user) {
113
-		$this->config->setUserValue($user->getUID(), 'core', 'two_factor_auth_disabled', 1);
114
-	}
115
-
116
-	/**
117
-	 * Enable all 2FA checks for the given user
118
-	 *
119
-	 * @param IUser $user
120
-	 */
121
-	public function enableTwoFactorAuthentication(IUser $user) {
122
-		$this->config->deleteUserValue($user->getUID(), 'core', 'two_factor_auth_disabled');
123
-	}
124
-
125
-	/**
126
-	 * Get a 2FA provider by its ID
127
-	 *
128
-	 * @param IUser $user
129
-	 * @param string $challengeProviderId
130
-	 * @return IProvider|null
131
-	 */
132
-	public function getProvider(IUser $user, $challengeProviderId) {
133
-		$providers = $this->getProviders($user, true);
134
-		return isset($providers[$challengeProviderId]) ? $providers[$challengeProviderId] : null;
135
-	}
136
-
137
-	/**
138
-	 * @param IUser $user
139
-	 * @return IProvider|null the backup provider, if enabled for the given user
140
-	 */
141
-	public function getBackupProvider(IUser $user) {
142
-		$providers = $this->getProviders($user, true);
143
-		if (!isset($providers[self::BACKUP_CODES_PROVIDER_ID])) {
144
-			return null;
145
-		}
146
-		return $providers[self::BACKUP_CODES_PROVIDER_ID];
147
-	}
148
-
149
-	/**
150
-	 * Get the list of 2FA providers for the given user
151
-	 *
152
-	 * @param IUser $user
153
-	 * @param bool $includeBackupApp
154
-	 * @return IProvider[]
155
-	 * @throws Exception
156
-	 */
157
-	public function getProviders(IUser $user, $includeBackupApp = false) {
158
-		$allApps = $this->appManager->getEnabledAppsForUser($user);
159
-		$providers = [];
160
-
161
-		foreach ($allApps as $appId) {
162
-			if (!$includeBackupApp && $appId === self::BACKUP_CODES_APP_ID) {
163
-				continue;
164
-			}
165
-
166
-			$info = $this->appManager->getAppInfo($appId);
167
-			if (isset($info['two-factor-providers'])) {
168
-				$providerClasses = $info['two-factor-providers'];
169
-				foreach ($providerClasses as $class) {
170
-					try {
171
-						$this->loadTwoFactorApp($appId);
172
-						$provider = OC::$server->query($class);
173
-						$providers[$provider->getId()] = $provider;
174
-					} catch (QueryException $exc) {
175
-						// Provider class can not be resolved
176
-						throw new Exception("Could not load two-factor auth provider $class");
177
-					}
178
-				}
179
-			}
180
-		}
181
-
182
-		return array_filter($providers, function ($provider) use ($user) {
183
-			/* @var $provider IProvider */
184
-			return $provider->isTwoFactorAuthEnabledForUser($user);
185
-		});
186
-	}
187
-
188
-	/**
189
-	 * Load an app by ID if it has not been loaded yet
190
-	 *
191
-	 * @param string $appId
192
-	 */
193
-	protected function loadTwoFactorApp($appId) {
194
-		if (!OC_App::isAppLoaded($appId)) {
195
-			OC_App::loadApp($appId);
196
-		}
197
-	}
198
-
199
-	/**
200
-	 * Verify the given challenge
201
-	 *
202
-	 * @param string $providerId
203
-	 * @param IUser $user
204
-	 * @param string $challenge
205
-	 * @return boolean
206
-	 */
207
-	public function verifyChallenge($providerId, IUser $user, $challenge) {
208
-		$provider = $this->getProvider($user, $providerId);
209
-		if (is_null($provider)) {
210
-			return false;
211
-		}
212
-
213
-		$passed = $provider->verifyChallenge($user, $challenge);
214
-		if ($passed) {
215
-			if ($this->session->get(self::REMEMBER_LOGIN) === true) {
216
-				// TODO: resolve cyclic dependency and use DI
217
-				\OC::$server->getUserSession()->createRememberMeToken($user);
218
-			}
219
-			$this->session->remove(self::SESSION_UID_KEY);
220
-			$this->session->remove(self::REMEMBER_LOGIN);
221
-			$this->session->set(self::SESSION_UID_DONE, $user->getUID());
222
-
223
-			// Clear token from db
224
-			$sessionId = $this->session->getId();
225
-			$token = $this->tokenProvider->getToken($sessionId);
226
-			$tokenId = $token->getId();
227
-			$this->config->deleteUserValue($user->getUID(), 'login_token_2fa', $tokenId);
228
-
229
-			$this->publishEvent($user, 'twofactor_success', [
230
-				'provider' => $provider->getDisplayName(),
231
-			]);
232
-		} else {
233
-			$this->publishEvent($user, 'twofactor_failed', [
234
-				'provider' => $provider->getDisplayName(),
235
-			]);
236
-		}
237
-		return $passed;
238
-	}
239
-
240
-	/**
241
-	 * Push a 2fa event the user's activity stream
242
-	 *
243
-	 * @param IUser $user
244
-	 * @param string $event
245
-	 */
246
-	private function publishEvent(IUser $user, $event, array $params) {
247
-		$activity = $this->activityManager->generateEvent();
248
-		$activity->setApp('core')
249
-			->setType('security')
250
-			->setAuthor($user->getUID())
251
-			->setAffectedUser($user->getUID())
252
-			->setSubject($event, $params);
253
-		try {
254
-			$this->activityManager->publish($activity);
255
-		} catch (BadMethodCallException $e) {
256
-			$this->logger->warning('could not publish backup code creation activity', ['app' => 'core']);
257
-			$this->logger->logException($e, ['app' => 'core']);
258
-		}
259
-	}
260
-
261
-	/**
262
-	 * Check if the currently logged in user needs to pass 2FA
263
-	 *
264
-	 * @param IUser $user the currently logged in user
265
-	 * @return boolean
266
-	 */
267
-	public function needsSecondFactor(IUser $user = null) {
268
-		if ($user === null) {
269
-			return false;
270
-		}
271
-
272
-		// If we are authenticated using an app password skip all this
273
-		if ($this->session->exists('app_password')) {
274
-			return false;
275
-		}
276
-
277
-		// First check if the session tells us we should do 2FA (99% case)
278
-		if (!$this->session->exists(self::SESSION_UID_KEY)) {
279
-
280
-			// Check if the session tells us it is 2FA authenticated already
281
-			if ($this->session->exists(self::SESSION_UID_DONE) &&
282
-				$this->session->get(self::SESSION_UID_DONE) === $user->getUID()) {
283
-				return false;
284
-			}
285
-
286
-			/*
44
+    const SESSION_UID_KEY = 'two_factor_auth_uid';
45
+    const SESSION_UID_DONE = 'two_factor_auth_passed';
46
+    const BACKUP_CODES_APP_ID = 'twofactor_backupcodes';
47
+    const BACKUP_CODES_PROVIDER_ID = 'backup_codes';
48
+    const REMEMBER_LOGIN = 'two_factor_remember_login';
49
+
50
+    /** @var AppManager */
51
+    private $appManager;
52
+
53
+    /** @var ISession */
54
+    private $session;
55
+
56
+    /** @var IConfig */
57
+    private $config;
58
+
59
+    /** @var IManager */
60
+    private $activityManager;
61
+
62
+    /** @var ILogger */
63
+    private $logger;
64
+
65
+    /** @var TokenProvider */
66
+    private $tokenProvider;
67
+
68
+    /** @var ITimeFactory */
69
+    private $timeFactory;
70
+
71
+    /**
72
+     * @param AppManager $appManager
73
+     * @param ISession $session
74
+     * @param IConfig $config
75
+     * @param IManager $activityManager
76
+     * @param ILogger $logger
77
+     * @param TokenProvider $tokenProvider
78
+     * @param ITimeFactory $timeFactory
79
+     */
80
+    public function __construct(AppManager $appManager,
81
+                                ISession $session,
82
+                                IConfig $config,
83
+                                IManager $activityManager,
84
+                                ILogger $logger,
85
+                                TokenProvider $tokenProvider,
86
+                                ITimeFactory $timeFactory) {
87
+        $this->appManager = $appManager;
88
+        $this->session = $session;
89
+        $this->config = $config;
90
+        $this->activityManager = $activityManager;
91
+        $this->logger = $logger;
92
+        $this->tokenProvider = $tokenProvider;
93
+        $this->timeFactory = $timeFactory;
94
+    }
95
+
96
+    /**
97
+     * Determine whether the user must provide a second factor challenge
98
+     *
99
+     * @param IUser $user
100
+     * @return boolean
101
+     */
102
+    public function isTwoFactorAuthenticated(IUser $user) {
103
+        $twoFactorEnabled = ((int) $this->config->getUserValue($user->getUID(), 'core', 'two_factor_auth_disabled', 0)) === 0;
104
+        return $twoFactorEnabled && count($this->getProviders($user)) > 0;
105
+    }
106
+
107
+    /**
108
+     * Disable 2FA checks for the given user
109
+     *
110
+     * @param IUser $user
111
+     */
112
+    public function disableTwoFactorAuthentication(IUser $user) {
113
+        $this->config->setUserValue($user->getUID(), 'core', 'two_factor_auth_disabled', 1);
114
+    }
115
+
116
+    /**
117
+     * Enable all 2FA checks for the given user
118
+     *
119
+     * @param IUser $user
120
+     */
121
+    public function enableTwoFactorAuthentication(IUser $user) {
122
+        $this->config->deleteUserValue($user->getUID(), 'core', 'two_factor_auth_disabled');
123
+    }
124
+
125
+    /**
126
+     * Get a 2FA provider by its ID
127
+     *
128
+     * @param IUser $user
129
+     * @param string $challengeProviderId
130
+     * @return IProvider|null
131
+     */
132
+    public function getProvider(IUser $user, $challengeProviderId) {
133
+        $providers = $this->getProviders($user, true);
134
+        return isset($providers[$challengeProviderId]) ? $providers[$challengeProviderId] : null;
135
+    }
136
+
137
+    /**
138
+     * @param IUser $user
139
+     * @return IProvider|null the backup provider, if enabled for the given user
140
+     */
141
+    public function getBackupProvider(IUser $user) {
142
+        $providers = $this->getProviders($user, true);
143
+        if (!isset($providers[self::BACKUP_CODES_PROVIDER_ID])) {
144
+            return null;
145
+        }
146
+        return $providers[self::BACKUP_CODES_PROVIDER_ID];
147
+    }
148
+
149
+    /**
150
+     * Get the list of 2FA providers for the given user
151
+     *
152
+     * @param IUser $user
153
+     * @param bool $includeBackupApp
154
+     * @return IProvider[]
155
+     * @throws Exception
156
+     */
157
+    public function getProviders(IUser $user, $includeBackupApp = false) {
158
+        $allApps = $this->appManager->getEnabledAppsForUser($user);
159
+        $providers = [];
160
+
161
+        foreach ($allApps as $appId) {
162
+            if (!$includeBackupApp && $appId === self::BACKUP_CODES_APP_ID) {
163
+                continue;
164
+            }
165
+
166
+            $info = $this->appManager->getAppInfo($appId);
167
+            if (isset($info['two-factor-providers'])) {
168
+                $providerClasses = $info['two-factor-providers'];
169
+                foreach ($providerClasses as $class) {
170
+                    try {
171
+                        $this->loadTwoFactorApp($appId);
172
+                        $provider = OC::$server->query($class);
173
+                        $providers[$provider->getId()] = $provider;
174
+                    } catch (QueryException $exc) {
175
+                        // Provider class can not be resolved
176
+                        throw new Exception("Could not load two-factor auth provider $class");
177
+                    }
178
+                }
179
+            }
180
+        }
181
+
182
+        return array_filter($providers, function ($provider) use ($user) {
183
+            /* @var $provider IProvider */
184
+            return $provider->isTwoFactorAuthEnabledForUser($user);
185
+        });
186
+    }
187
+
188
+    /**
189
+     * Load an app by ID if it has not been loaded yet
190
+     *
191
+     * @param string $appId
192
+     */
193
+    protected function loadTwoFactorApp($appId) {
194
+        if (!OC_App::isAppLoaded($appId)) {
195
+            OC_App::loadApp($appId);
196
+        }
197
+    }
198
+
199
+    /**
200
+     * Verify the given challenge
201
+     *
202
+     * @param string $providerId
203
+     * @param IUser $user
204
+     * @param string $challenge
205
+     * @return boolean
206
+     */
207
+    public function verifyChallenge($providerId, IUser $user, $challenge) {
208
+        $provider = $this->getProvider($user, $providerId);
209
+        if (is_null($provider)) {
210
+            return false;
211
+        }
212
+
213
+        $passed = $provider->verifyChallenge($user, $challenge);
214
+        if ($passed) {
215
+            if ($this->session->get(self::REMEMBER_LOGIN) === true) {
216
+                // TODO: resolve cyclic dependency and use DI
217
+                \OC::$server->getUserSession()->createRememberMeToken($user);
218
+            }
219
+            $this->session->remove(self::SESSION_UID_KEY);
220
+            $this->session->remove(self::REMEMBER_LOGIN);
221
+            $this->session->set(self::SESSION_UID_DONE, $user->getUID());
222
+
223
+            // Clear token from db
224
+            $sessionId = $this->session->getId();
225
+            $token = $this->tokenProvider->getToken($sessionId);
226
+            $tokenId = $token->getId();
227
+            $this->config->deleteUserValue($user->getUID(), 'login_token_2fa', $tokenId);
228
+
229
+            $this->publishEvent($user, 'twofactor_success', [
230
+                'provider' => $provider->getDisplayName(),
231
+            ]);
232
+        } else {
233
+            $this->publishEvent($user, 'twofactor_failed', [
234
+                'provider' => $provider->getDisplayName(),
235
+            ]);
236
+        }
237
+        return $passed;
238
+    }
239
+
240
+    /**
241
+     * Push a 2fa event the user's activity stream
242
+     *
243
+     * @param IUser $user
244
+     * @param string $event
245
+     */
246
+    private function publishEvent(IUser $user, $event, array $params) {
247
+        $activity = $this->activityManager->generateEvent();
248
+        $activity->setApp('core')
249
+            ->setType('security')
250
+            ->setAuthor($user->getUID())
251
+            ->setAffectedUser($user->getUID())
252
+            ->setSubject($event, $params);
253
+        try {
254
+            $this->activityManager->publish($activity);
255
+        } catch (BadMethodCallException $e) {
256
+            $this->logger->warning('could not publish backup code creation activity', ['app' => 'core']);
257
+            $this->logger->logException($e, ['app' => 'core']);
258
+        }
259
+    }
260
+
261
+    /**
262
+     * Check if the currently logged in user needs to pass 2FA
263
+     *
264
+     * @param IUser $user the currently logged in user
265
+     * @return boolean
266
+     */
267
+    public function needsSecondFactor(IUser $user = null) {
268
+        if ($user === null) {
269
+            return false;
270
+        }
271
+
272
+        // If we are authenticated using an app password skip all this
273
+        if ($this->session->exists('app_password')) {
274
+            return false;
275
+        }
276
+
277
+        // First check if the session tells us we should do 2FA (99% case)
278
+        if (!$this->session->exists(self::SESSION_UID_KEY)) {
279
+
280
+            // Check if the session tells us it is 2FA authenticated already
281
+            if ($this->session->exists(self::SESSION_UID_DONE) &&
282
+                $this->session->get(self::SESSION_UID_DONE) === $user->getUID()) {
283
+                return false;
284
+            }
285
+
286
+            /*
287 287
 			 * If the session is expired check if we are not logged in by a token
288 288
 			 * that still needs 2FA auth
289 289
 			 */
290
-			try {
291
-				$sessionId = $this->session->getId();
292
-				$token = $this->tokenProvider->getToken($sessionId);
293
-				$tokenId = $token->getId();
294
-				$tokensNeeding2FA = $this->config->getUserKeys($user->getUID(), 'login_token_2fa');
295
-
296
-				if (!in_array($tokenId, $tokensNeeding2FA, true)) {
297
-					$this->session->set(self::SESSION_UID_DONE, $user->getUID());
298
-					return false;
299
-				}
300
-			} catch (InvalidTokenException $e) {
301
-			}
302
-		}
303
-
304
-		if (!$this->isTwoFactorAuthenticated($user)) {
305
-			// There is no second factor any more -> let the user pass
306
-			//   This prevents infinite redirect loops when a user is about
307
-			//   to solve the 2FA challenge, and the provider app is
308
-			//   disabled the same time
309
-			$this->session->remove(self::SESSION_UID_KEY);
310
-
311
-			$keys = $this->config->getUserKeys($user->getUID(), 'login_token_2fa');
312
-			foreach ($keys as $key) {
313
-				$this->config->deleteUserValue($user->getUID(), 'login_token_2fa', $key);
314
-			}
315
-			return false;
316
-		}
317
-
318
-		return true;
319
-	}
320
-
321
-	/**
322
-	 * Prepare the 2FA login
323
-	 *
324
-	 * @param IUser $user
325
-	 * @param boolean $rememberMe
326
-	 */
327
-	public function prepareTwoFactorLogin(IUser $user, $rememberMe) {
328
-		$this->session->set(self::SESSION_UID_KEY, $user->getUID());
329
-		$this->session->set(self::REMEMBER_LOGIN, $rememberMe);
330
-
331
-		$id = $this->session->getId();
332
-		$token = $this->tokenProvider->getToken($id);
333
-		$this->config->setUserValue($user->getUID(), 'login_token_2fa', $token->getId(), $this->timeFactory->getTime());
334
-	}
290
+            try {
291
+                $sessionId = $this->session->getId();
292
+                $token = $this->tokenProvider->getToken($sessionId);
293
+                $tokenId = $token->getId();
294
+                $tokensNeeding2FA = $this->config->getUserKeys($user->getUID(), 'login_token_2fa');
295
+
296
+                if (!in_array($tokenId, $tokensNeeding2FA, true)) {
297
+                    $this->session->set(self::SESSION_UID_DONE, $user->getUID());
298
+                    return false;
299
+                }
300
+            } catch (InvalidTokenException $e) {
301
+            }
302
+        }
303
+
304
+        if (!$this->isTwoFactorAuthenticated($user)) {
305
+            // There is no second factor any more -> let the user pass
306
+            //   This prevents infinite redirect loops when a user is about
307
+            //   to solve the 2FA challenge, and the provider app is
308
+            //   disabled the same time
309
+            $this->session->remove(self::SESSION_UID_KEY);
310
+
311
+            $keys = $this->config->getUserKeys($user->getUID(), 'login_token_2fa');
312
+            foreach ($keys as $key) {
313
+                $this->config->deleteUserValue($user->getUID(), 'login_token_2fa', $key);
314
+            }
315
+            return false;
316
+        }
317
+
318
+        return true;
319
+    }
320
+
321
+    /**
322
+     * Prepare the 2FA login
323
+     *
324
+     * @param IUser $user
325
+     * @param boolean $rememberMe
326
+     */
327
+    public function prepareTwoFactorLogin(IUser $user, $rememberMe) {
328
+        $this->session->set(self::SESSION_UID_KEY, $user->getUID());
329
+        $this->session->set(self::REMEMBER_LOGIN, $rememberMe);
330
+
331
+        $id = $this->session->getId();
332
+        $token = $this->tokenProvider->getToken($id);
333
+        $this->config->setUserValue($user->getUID(), 'login_token_2fa', $token->getId(), $this->timeFactory->getTime());
334
+    }
335 335
 
336 336
 }
Please login to merge, or discard this patch.
lib/private/Authentication/Token/DefaultTokenMapper.php 2 patches
Spacing   +1 added lines, -1 removed lines patch added patch discarded remove patch
@@ -129,7 +129,7 @@
 block discarded – undo
129 129
 		$data = $result->fetchAll();
130 130
 		$result->closeCursor();
131 131
 
132
-		$entities = array_map(function ($row) {
132
+		$entities = array_map(function($row) {
133 133
 			return DefaultToken::fromRow($row);
134 134
 		}, $data);
135 135
 
Please login to merge, or discard this patch.
Indentation   +129 added lines, -129 removed lines patch added patch discarded remove patch
@@ -30,134 +30,134 @@
 block discarded – undo
30 30
 
31 31
 class DefaultTokenMapper extends Mapper {
32 32
 
33
-	public function __construct(IDBConnection $db) {
34
-		parent::__construct($db, 'authtoken');
35
-	}
36
-
37
-	/**
38
-	 * Invalidate (delete) a given token
39
-	 *
40
-	 * @param string $token
41
-	 */
42
-	public function invalidate($token) {
43
-		/* @var $qb IQueryBuilder */
44
-		$qb = $this->db->getQueryBuilder();
45
-		$qb->delete('authtoken')
46
-			->where($qb->expr()->eq('token', $qb->createParameter('token')))
47
-			->setParameter('token', $token)
48
-			->execute();
49
-	}
50
-
51
-	/**
52
-	 * @param int $olderThan
53
-	 * @param int $remember
54
-	 */
55
-	public function invalidateOld($olderThan, $remember = IToken::DO_NOT_REMEMBER) {
56
-		/* @var $qb IQueryBuilder */
57
-		$qb = $this->db->getQueryBuilder();
58
-		$qb->delete('authtoken')
59
-			->where($qb->expr()->lt('last_activity', $qb->createNamedParameter($olderThan, IQueryBuilder::PARAM_INT)))
60
-			->andWhere($qb->expr()->eq('type', $qb->createNamedParameter(IToken::TEMPORARY_TOKEN, IQueryBuilder::PARAM_INT)))
61
-			->andWhere($qb->expr()->eq('remember', $qb->createNamedParameter($remember, IQueryBuilder::PARAM_INT)))
62
-			->execute();
63
-	}
64
-
65
-	/**
66
-	 * Get the user UID for the given token
67
-	 *
68
-	 * @param string $token
69
-	 * @throws DoesNotExistException
70
-	 * @return DefaultToken
71
-	 */
72
-	public function getToken($token) {
73
-		/* @var $qb IQueryBuilder */
74
-		$qb = $this->db->getQueryBuilder();
75
-		$result = $qb->select('id', 'uid', 'login_name', 'password', 'name', 'type', 'remember', 'token', 'last_activity', 'last_check', 'scope')
76
-			->from('authtoken')
77
-			->where($qb->expr()->eq('token', $qb->createNamedParameter($token)))
78
-			->execute();
79
-
80
-		$data = $result->fetch();
81
-		$result->closeCursor();
82
-		if ($data === false) {
83
-			throw new DoesNotExistException('token does not exist');
84
-		}
85
-		return DefaultToken::fromRow($data);
86
-	}
87
-
88
-	/**
89
-	 * Get the token for $id
90
-	 *
91
-	 * @param string $id
92
-	 * @throws DoesNotExistException
93
-	 * @return DefaultToken
94
-	 */
95
-	public function getTokenById($id) {
96
-		/* @var $qb IQueryBuilder */
97
-		$qb = $this->db->getQueryBuilder();
98
-		$result = $qb->select('id', 'uid', 'login_name', 'password', 'name', 'type', 'token', 'last_activity', 'last_check', 'scope')
99
-			->from('authtoken')
100
-			->where($qb->expr()->eq('id', $qb->createNamedParameter($id)))
101
-			->execute();
102
-
103
-		$data = $result->fetch();
104
-		$result->closeCursor();
105
-		if ($data === false) {
106
-			throw new DoesNotExistException('token does not exist');
107
-		}
108
-		return DefaultToken::fromRow($data);
109
-	}
110
-
111
-	/**
112
-	 * Get all tokens of a user
113
-	 *
114
-	 * The provider may limit the number of result rows in case of an abuse
115
-	 * where a high number of (session) tokens is generated
116
-	 *
117
-	 * @param IUser $user
118
-	 * @return DefaultToken[]
119
-	 */
120
-	public function getTokenByUser(IUser $user) {
121
-		/* @var $qb IQueryBuilder */
122
-		$qb = $this->db->getQueryBuilder();
123
-		$qb->select('id', 'uid', 'login_name', 'password', 'name', 'type', 'remember', 'token', 'last_activity', 'last_check', 'scope')
124
-			->from('authtoken')
125
-			->where($qb->expr()->eq('uid', $qb->createNamedParameter($user->getUID())))
126
-			->setMaxResults(1000);
127
-		$result = $qb->execute();
128
-		$data = $result->fetchAll();
129
-		$result->closeCursor();
130
-
131
-		$entities = array_map(function ($row) {
132
-			return DefaultToken::fromRow($row);
133
-		}, $data);
134
-
135
-		return $entities;
136
-	}
137
-
138
-	/**
139
-	 * @param IUser $user
140
-	 * @param int $id
141
-	 */
142
-	public function deleteById(IUser $user, $id) {
143
-		/* @var $qb IQueryBuilder */
144
-		$qb = $this->db->getQueryBuilder();
145
-		$qb->delete('authtoken')
146
-			->where($qb->expr()->eq('id', $qb->createNamedParameter($id)))
147
-			->andWhere($qb->expr()->eq('uid', $qb->createNamedParameter($user->getUID())));
148
-		$qb->execute();
149
-	}
150
-
151
-	/**
152
-	 * delete all auth token which belong to a specific client if the client was deleted
153
-	 *
154
-	 * @param string $name
155
-	 */
156
-	public function deleteByName($name) {
157
-		$qb = $this->db->getQueryBuilder();
158
-		$qb->delete('authtoken')
159
-			->where($qb->expr()->eq('name', $qb->createNamedParameter($name), IQueryBuilder::PARAM_STR));
160
-		$qb->execute();
161
-	}
33
+    public function __construct(IDBConnection $db) {
34
+        parent::__construct($db, 'authtoken');
35
+    }
36
+
37
+    /**
38
+     * Invalidate (delete) a given token
39
+     *
40
+     * @param string $token
41
+     */
42
+    public function invalidate($token) {
43
+        /* @var $qb IQueryBuilder */
44
+        $qb = $this->db->getQueryBuilder();
45
+        $qb->delete('authtoken')
46
+            ->where($qb->expr()->eq('token', $qb->createParameter('token')))
47
+            ->setParameter('token', $token)
48
+            ->execute();
49
+    }
50
+
51
+    /**
52
+     * @param int $olderThan
53
+     * @param int $remember
54
+     */
55
+    public function invalidateOld($olderThan, $remember = IToken::DO_NOT_REMEMBER) {
56
+        /* @var $qb IQueryBuilder */
57
+        $qb = $this->db->getQueryBuilder();
58
+        $qb->delete('authtoken')
59
+            ->where($qb->expr()->lt('last_activity', $qb->createNamedParameter($olderThan, IQueryBuilder::PARAM_INT)))
60
+            ->andWhere($qb->expr()->eq('type', $qb->createNamedParameter(IToken::TEMPORARY_TOKEN, IQueryBuilder::PARAM_INT)))
61
+            ->andWhere($qb->expr()->eq('remember', $qb->createNamedParameter($remember, IQueryBuilder::PARAM_INT)))
62
+            ->execute();
63
+    }
64
+
65
+    /**
66
+     * Get the user UID for the given token
67
+     *
68
+     * @param string $token
69
+     * @throws DoesNotExistException
70
+     * @return DefaultToken
71
+     */
72
+    public function getToken($token) {
73
+        /* @var $qb IQueryBuilder */
74
+        $qb = $this->db->getQueryBuilder();
75
+        $result = $qb->select('id', 'uid', 'login_name', 'password', 'name', 'type', 'remember', 'token', 'last_activity', 'last_check', 'scope')
76
+            ->from('authtoken')
77
+            ->where($qb->expr()->eq('token', $qb->createNamedParameter($token)))
78
+            ->execute();
79
+
80
+        $data = $result->fetch();
81
+        $result->closeCursor();
82
+        if ($data === false) {
83
+            throw new DoesNotExistException('token does not exist');
84
+        }
85
+        return DefaultToken::fromRow($data);
86
+    }
87
+
88
+    /**
89
+     * Get the token for $id
90
+     *
91
+     * @param string $id
92
+     * @throws DoesNotExistException
93
+     * @return DefaultToken
94
+     */
95
+    public function getTokenById($id) {
96
+        /* @var $qb IQueryBuilder */
97
+        $qb = $this->db->getQueryBuilder();
98
+        $result = $qb->select('id', 'uid', 'login_name', 'password', 'name', 'type', 'token', 'last_activity', 'last_check', 'scope')
99
+            ->from('authtoken')
100
+            ->where($qb->expr()->eq('id', $qb->createNamedParameter($id)))
101
+            ->execute();
102
+
103
+        $data = $result->fetch();
104
+        $result->closeCursor();
105
+        if ($data === false) {
106
+            throw new DoesNotExistException('token does not exist');
107
+        }
108
+        return DefaultToken::fromRow($data);
109
+    }
110
+
111
+    /**
112
+     * Get all tokens of a user
113
+     *
114
+     * The provider may limit the number of result rows in case of an abuse
115
+     * where a high number of (session) tokens is generated
116
+     *
117
+     * @param IUser $user
118
+     * @return DefaultToken[]
119
+     */
120
+    public function getTokenByUser(IUser $user) {
121
+        /* @var $qb IQueryBuilder */
122
+        $qb = $this->db->getQueryBuilder();
123
+        $qb->select('id', 'uid', 'login_name', 'password', 'name', 'type', 'remember', 'token', 'last_activity', 'last_check', 'scope')
124
+            ->from('authtoken')
125
+            ->where($qb->expr()->eq('uid', $qb->createNamedParameter($user->getUID())))
126
+            ->setMaxResults(1000);
127
+        $result = $qb->execute();
128
+        $data = $result->fetchAll();
129
+        $result->closeCursor();
130
+
131
+        $entities = array_map(function ($row) {
132
+            return DefaultToken::fromRow($row);
133
+        }, $data);
134
+
135
+        return $entities;
136
+    }
137
+
138
+    /**
139
+     * @param IUser $user
140
+     * @param int $id
141
+     */
142
+    public function deleteById(IUser $user, $id) {
143
+        /* @var $qb IQueryBuilder */
144
+        $qb = $this->db->getQueryBuilder();
145
+        $qb->delete('authtoken')
146
+            ->where($qb->expr()->eq('id', $qb->createNamedParameter($id)))
147
+            ->andWhere($qb->expr()->eq('uid', $qb->createNamedParameter($user->getUID())));
148
+        $qb->execute();
149
+    }
150
+
151
+    /**
152
+     * delete all auth token which belong to a specific client if the client was deleted
153
+     *
154
+     * @param string $name
155
+     */
156
+    public function deleteByName($name) {
157
+        $qb = $this->db->getQueryBuilder();
158
+        $qb->delete('authtoken')
159
+            ->where($qb->expr()->eq('name', $qb->createNamedParameter($name), IQueryBuilder::PARAM_STR));
160
+        $qb->execute();
161
+    }
162 162
 
163 163
 }
Please login to merge, or discard this patch.
lib/private/Authentication/Token/DefaultTokenCleanupJob.php 1 patch
Indentation   +5 added lines, -5 removed lines patch added patch discarded remove patch
@@ -27,10 +27,10 @@
 block discarded – undo
27 27
 
28 28
 class DefaultTokenCleanupJob extends Job {
29 29
 
30
-	protected function run($argument) {
31
-		/* @var $provider IProvider */
32
-		$provider = OC::$server->query('OC\Authentication\Token\IProvider');
33
-		$provider->invalidateOldTokens();
34
-	}
30
+    protected function run($argument) {
31
+        /* @var $provider IProvider */
32
+        $provider = OC::$server->query('OC\Authentication\Token\IProvider');
33
+        $provider->invalidateOldTokens();
34
+    }
35 35
 
36 36
 }
Please login to merge, or discard this patch.
lib/private/Authentication/Token/DefaultToken.php 2 patches
Indentation   +131 added lines, -131 removed lines patch added patch discarded remove patch
@@ -42,135 +42,135 @@
 block discarded – undo
42 42
  */
43 43
 class DefaultToken extends Entity implements IToken {
44 44
 
45
-	/**
46
-	 * @var string user UID
47
-	 */
48
-	protected $uid;
49
-
50
-	/**
51
-	 * @var string login name used for generating the token
52
-	 */
53
-	protected $loginName;
54
-
55
-	/**
56
-	 * @var string encrypted user password
57
-	 */
58
-	protected $password;
59
-
60
-	/**
61
-	 * @var string token name (e.g. browser/OS)
62
-	 */
63
-	protected $name;
64
-
65
-	/**
66
-	 * @var string
67
-	 */
68
-	protected $token;
69
-
70
-	/**
71
-	 * @var int
72
-	 */
73
-	protected $type;
74
-
75
-	/**
76
-	 * @var int
77
-	 */
78
-	protected $remember;
79
-
80
-	/**
81
-	 * @var int
82
-	 */
83
-	protected $lastActivity;
84
-
85
-	/**
86
-	 * @var int
87
-	 */
88
-	protected $lastCheck;
89
-
90
-	/**
91
-	 * @var string
92
-	 */
93
-	protected $scope;
94
-
95
-	public function __construct() {
96
-		$this->addType('type', 'int');
97
-		$this->addType('lastActivity', 'int');
98
-		$this->addType('lastCheck', 'int');
99
-	}
100
-
101
-	public function getId() {
102
-		return $this->id;
103
-	}
104
-
105
-	public function getUID() {
106
-		return $this->uid;
107
-	}
108
-
109
-	/**
110
-	 * Get the login name used when generating the token
111
-	 *
112
-	 * @return string
113
-	 */
114
-	public function getLoginName() {
115
-		return parent::getLoginName();
116
-	}
117
-
118
-	/**
119
-	 * Get the (encrypted) login password
120
-	 *
121
-	 * @return string
122
-	 */
123
-	public function getPassword() {
124
-		return parent::getPassword();
125
-	}
126
-
127
-	public function jsonSerialize() {
128
-		return [
129
-			'id' => $this->id,
130
-			'name' => $this->name,
131
-			'lastActivity' => $this->lastActivity,
132
-			'type' => $this->type,
133
-			'scope' => $this->getScopeAsArray()
134
-		];
135
-	}
136
-
137
-	/**
138
-	 * Get the timestamp of the last password check
139
-	 *
140
-	 * @return int
141
-	 */
142
-	public function getLastCheck() {
143
-		return parent::getLastCheck();
144
-	}
145
-
146
-	/**
147
-	 * Get the timestamp of the last password check
148
-	 *
149
-	 * @param int $time
150
-	 */
151
-	public function setLastCheck($time) {
152
-		return parent::setLastCheck($time);
153
-	}
154
-
155
-	public function getScope() {
156
-		return parent::getScope();
157
-	}
158
-
159
-	public function getScopeAsArray() {
160
-		$scope = json_decode($this->getScope(), true);
161
-		if (!$scope) {
162
-			return [
163
-				'filesystem'=> true
164
-			];
165
-		}
166
-		return $scope;
167
-	}
168
-
169
-	public function setScope($scope) {
170
-		if (is_array($scope)) {
171
-			parent::setScope(json_encode($scope));
172
-		} else {
173
-			parent::setScope((string)$scope);
174
-		}
175
-	}
45
+    /**
46
+     * @var string user UID
47
+     */
48
+    protected $uid;
49
+
50
+    /**
51
+     * @var string login name used for generating the token
52
+     */
53
+    protected $loginName;
54
+
55
+    /**
56
+     * @var string encrypted user password
57
+     */
58
+    protected $password;
59
+
60
+    /**
61
+     * @var string token name (e.g. browser/OS)
62
+     */
63
+    protected $name;
64
+
65
+    /**
66
+     * @var string
67
+     */
68
+    protected $token;
69
+
70
+    /**
71
+     * @var int
72
+     */
73
+    protected $type;
74
+
75
+    /**
76
+     * @var int
77
+     */
78
+    protected $remember;
79
+
80
+    /**
81
+     * @var int
82
+     */
83
+    protected $lastActivity;
84
+
85
+    /**
86
+     * @var int
87
+     */
88
+    protected $lastCheck;
89
+
90
+    /**
91
+     * @var string
92
+     */
93
+    protected $scope;
94
+
95
+    public function __construct() {
96
+        $this->addType('type', 'int');
97
+        $this->addType('lastActivity', 'int');
98
+        $this->addType('lastCheck', 'int');
99
+    }
100
+
101
+    public function getId() {
102
+        return $this->id;
103
+    }
104
+
105
+    public function getUID() {
106
+        return $this->uid;
107
+    }
108
+
109
+    /**
110
+     * Get the login name used when generating the token
111
+     *
112
+     * @return string
113
+     */
114
+    public function getLoginName() {
115
+        return parent::getLoginName();
116
+    }
117
+
118
+    /**
119
+     * Get the (encrypted) login password
120
+     *
121
+     * @return string
122
+     */
123
+    public function getPassword() {
124
+        return parent::getPassword();
125
+    }
126
+
127
+    public function jsonSerialize() {
128
+        return [
129
+            'id' => $this->id,
130
+            'name' => $this->name,
131
+            'lastActivity' => $this->lastActivity,
132
+            'type' => $this->type,
133
+            'scope' => $this->getScopeAsArray()
134
+        ];
135
+    }
136
+
137
+    /**
138
+     * Get the timestamp of the last password check
139
+     *
140
+     * @return int
141
+     */
142
+    public function getLastCheck() {
143
+        return parent::getLastCheck();
144
+    }
145
+
146
+    /**
147
+     * Get the timestamp of the last password check
148
+     *
149
+     * @param int $time
150
+     */
151
+    public function setLastCheck($time) {
152
+        return parent::setLastCheck($time);
153
+    }
154
+
155
+    public function getScope() {
156
+        return parent::getScope();
157
+    }
158
+
159
+    public function getScopeAsArray() {
160
+        $scope = json_decode($this->getScope(), true);
161
+        if (!$scope) {
162
+            return [
163
+                'filesystem'=> true
164
+            ];
165
+        }
166
+        return $scope;
167
+    }
168
+
169
+    public function setScope($scope) {
170
+        if (is_array($scope)) {
171
+            parent::setScope(json_encode($scope));
172
+        } else {
173
+            parent::setScope((string)$scope);
174
+        }
175
+    }
176 176
 }
Please login to merge, or discard this patch.
Spacing   +1 added lines, -1 removed lines patch added patch discarded remove patch
@@ -170,7 +170,7 @@
 block discarded – undo
170 170
 		if (is_array($scope)) {
171 171
 			parent::setScope(json_encode($scope));
172 172
 		} else {
173
-			parent::setScope((string)$scope);
173
+			parent::setScope((string) $scope);
174 174
 		}
175 175
 	}
176 176
 }
Please login to merge, or discard this patch.